☆36Jul 13, 2016Updated 9 years ago
Alternatives and similar repositories for metasploit-modules
Users that are interested in metasploit-modules are comparing it to the libraries listed below
Sorting:
- A breadth first web crawler that stores HTTP headers in a MongoDB database with a web front end all written in Go.☆24Apr 4, 2018Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- ☆11Mar 14, 2019Updated 6 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- 知乎日报RSS版☆22Apr 12, 2016Updated 9 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Automated Python Code Injection Tool☆87Oct 13, 2021Updated 4 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆16May 6, 2015Updated 10 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Mar 31, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Oct 22, 2025Updated 4 months ago
- ☆739Jan 16, 2021Updated 5 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- ☆16Aug 9, 2017Updated 8 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Apr 23, 2023Updated 2 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆408Jul 14, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago